VSOS Overview

Virtual Auditor’s “Virtual Security Officer Server” (VSOS) is a fully managed information security solution that enables organizations to collect, store, and analyze network security events to meet IT compliance requirements. This unique solution correlates the impact of the events to measure the level of compliance to regulatory mandates and industry requirements. The complex data is parsed and presented in clear and understandable, yet comprehensive reports.

What's it Do?

VSOS is unlike a third party auditor plugging his/her foreign machine into your network and scanning with a number of unknown or unsafe tools, VA takes a different approach. Imagine taking all of the best assessment security tools in the industry and molding them into one assessment engine. Virtual Audior’s VSOS is such an engine. VSOS is located in your data center, never “in the cloud”.

Zero Days, organized crime, poor development practices and bad or inconsistent patch management all lead to unknown threats emerging and continuously growing.

Threat Statistics

In 2016, the number of zero-day vulnerabilities discovered more than doubled to 54, a 125 percent increase from the year before. Or put another way, a new zero-day vulnerability was found every week (on average) in 2016. Furthermore, there was a record-setting total of nine mega-breaches, and the reported number of exposed identities jumped to 429 million.

But this number hides a bigger story. In 2016, more companies chose not to reveal the full extent of their data breaches. A conservative estimate of unreported breaches pushes the number of records lost to more than half a billion. (Source: Symantec)

In 2016, even fewer SMBs used standard tools like configuration and patching to prevent security breaches, compared with 39 percent who did so in 2015.

39%

At least 52 percent of respondents felt that a successful cyberattack against their network would take place within the year.

52%

As much as 70 percent of cyberattacks use a combination of phishing and hacking techniques and involve a secondary victim.